A technician documents the findings of illegal material that was found on a workstation. Which of the following should the technician do NEXT when storing the workstation?

A. Set all users to administrators
B. Destroy the hard drive
C. Reimage the workstation and deploy
D. Adhere to the chain of custody

Answer: D. Adhere to the chain of custody

Computer Science & Information Technology

You might also like to view...

____ are the most common way to access resources available throughout the environment.

A. System boosters B. Network ports C. Firewalls D. Data scopes

Computer Science & Information Technology

Within the parentheses of the for statement are ____ items separated by semicolons.

A. two B. three C. four D. five

Computer Science & Information Technology